×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [11]
北京大学 [9]
软件研究所 [9]
北京航空航天大学 [8]
大连理工大学 [4]
自动化研究所 [3]
更多...
内容类型
期刊论文 [38]
会议论文 [18]
其他 [10]
学位论文 [2]
会议 [1]
发表日期
2022 [2]
2021 [1]
2020 [2]
2019 [6]
2018 [12]
2017 [10]
更多...
学科主题
Computer S... [3]
electric n... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共69条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Subgraph-aware graph structure revision for spatial-temporal graph modeling
期刊论文
NEURAL NETWORKS, 2022, 卷号: 154, 页码: 190-202
作者:
Wang, Yuhu
;
Zhang, Chunxia
;
Xiang, Shiming
;
Pan, Chunhong
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2023/01/09
Graph structure learning
Graph neural network
Spatial-temporal graph modeling
Robust Detection of Malicious URLs With Self-Paced Wide & Deep Learning
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 2, 页码: 717-730
作者:
Liang, Yunji
;
Wang, Qiushi
;
Xiong, Kang
;
Zheng, Xiaolong
;
Yu, Zhiwen
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/06
paced learning
temporal convolutional network
factorization machine
wide & deep
malicious URL detection
Enhancing the security of memory in cloud infrastructure through in-phase change memory data randomisation
期刊论文
IET COMPUTERS AND DIGITAL TECHNIQUES, 2021, 页码: 14
作者:
Zhou, Xianzhong
;
Wang, Ying
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2021/12/01
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:
Cui, Aijiao
;
Li, Mengyang
;
Qu, Gang
;
Li, Huawei
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2021/12/01
Ciphers
Encryption
Integrated circuits
Side-channel attacks
Testing
Cryptographic hash function
obfuscation logic
scan design
scan-based side-channel attack
delta-Calculus: A New Approach to Quantifying Location Privacy
期刊论文
CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 卷号: 63, 期号: 3, 页码: 1323-1342
作者:
Yin, LH (Yin, Lihua)[ 1 ]
;
Li, R (Li, Ran)[ 1,2 ]
;
Ding, JQ (Ding, Jingquan)[ 3,4,5 ]
;
Li, X (Li, Xiao)[ 3,4,5 ]
;
Guo, YC (Guo, Yunchuan)[ 2 ]
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2020/05/27
Location privacy
delta-calculus
relative entropy
Process Calculus for Modeling and Quantifying Location Privacy
期刊论文
Procedia Computer Science, 2019, 卷号: 147, 期号: 1, 页码: 407-415
作者:
Ding, Jingquan
;
Li, Xiao
;
Guo, Yunchuan
;
Yin, Lihua
;
Zhang, Huibing
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2019/06/13
Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds
期刊论文
IEEE SYSTEMS JOURNAL, 2019, 卷号: 13, 期号: 2
作者:
Zhang, Mingwu
;
Zhang, Yudi
;
Jiang, Yan
;
Shen, Jian
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Average case
encrypted verifiable encrypted signature (EVES)
obfuscation
untrusted cloud
virtual black-box
Public-Key Encryption With Keyword Search via Obfuscation
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 37394-37405
作者:
Hu, Chengyu
;
Liu, Pengtao
;
Yang, Rupeng
;
Xu, Yan
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/11
Public-key encryption with keyword search
obfuscation
keyword guessing
attacks
multiple functionalities
multi-user setting
IND-secure quantum symmetric encryption based on point obfuscation
期刊论文
QUANTUM INFORMATION PROCESSING, 2019, 卷号: 18
作者:
Chen, Ranyiliu
;
Shang, Tao
;
Liu, Jianwei
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Quantum cryptography
Quantum obfuscation
Quantum symmetric encryption
IND-security
Exploiting Spin-Orbit Torque Devices As Reconfigurable Logic for Circuit Obfuscation
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2019, 卷号: 38, 页码: 57-69
作者:
Yang, Jianlei
;
Wang, Xueyan
;
Zhou, Qiang
;
Wang, Zhaohao
;
Li, Hai
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/30
Circuit obfuscation
magnetic tunnel junction
reconfigurable logic
spin-orbit torque (SOT)
©版权所有 ©2017 CSpace - Powered by
CSpace